Skip to content
Snippets Groups Projects
Select Git revision
  • android-7.1.2_r28_klist
  • master default protected
  • pie-cts-release
  • pie-vts-release
  • pie-cts-dev
  • oreo-mr1-iot-release
  • sdk-release
  • oreo-m6-s4-release
  • oreo-m4-s12-release
  • pie-release
  • pie-r2-release
  • pie-r2-s1-release
  • oreo-vts-release
  • oreo-cts-release
  • oreo-dev
  • oreo-mr1-dev
  • pie-gsi
  • pie-platform-release
  • pie-dev
  • oreo-cts-dev
  • android-o-mr1-iot-release-1.0.4
  • android-9.0.0_r8
  • android-9.0.0_r7
  • android-9.0.0_r6
  • android-9.0.0_r5
  • android-8.1.0_r46
  • android-8.1.0_r45
  • android-n-iot-release-smart-display-r2
  • android-vts-8.1_r5
  • android-cts-8.1_r8
  • android-cts-8.0_r12
  • android-cts-7.1_r20
  • android-cts-7.0_r24
  • android-o-mr1-iot-release-1.0.3
  • android-cts-9.0_r1
  • android-8.1.0_r43
  • android-8.1.0_r42
  • android-n-iot-release-smart-display
  • android-p-preview-5
  • android-9.0.0_r3
40 results

app.te

  • Stephen Smalley's avatar
    25628434
    Audit accesses on unlabeled files. · 25628434
    Stephen Smalley authored
    
    To see whether we can safely remove these allow rules on unlabeled files
    since we now have restorecon_recursive /data in init.rc to fully relabel
    legacy userdata partitions, audit all accesses on such files.
    
    Exclude the init domain since it performs the restorecon_recursive /data
    and therefore will read unlabeled directories, stat unlabeled files,
    and relabel unlabeled directories and files on upgrade.  init may also
    create/write unlabeled files in /data prior to the restorecon_recursive
    /data being called.
    
    Exclude the kernel domain for search on unlabeled:dir as this happens
    during cgroup filesystem initialization in the kernel as a side effect
    of populating the cgroup directory during the superblock initialization
    before SELinux has set the label on the root directory.
    
    Change-Id: Ieb5d807f529db9a4bf3e6c93e6b37c9648c04633
    Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
    25628434
    History
    Audit accesses on unlabeled files.
    Stephen Smalley authored
    
    To see whether we can safely remove these allow rules on unlabeled files
    since we now have restorecon_recursive /data in init.rc to fully relabel
    legacy userdata partitions, audit all accesses on such files.
    
    Exclude the init domain since it performs the restorecon_recursive /data
    and therefore will read unlabeled directories, stat unlabeled files,
    and relabel unlabeled directories and files on upgrade.  init may also
    create/write unlabeled files in /data prior to the restorecon_recursive
    /data being called.
    
    Exclude the kernel domain for search on unlabeled:dir as this happens
    during cgroup filesystem initialization in the kernel as a side effect
    of populating the cgroup directory during the superblock initialization
    before SELinux has set the label on the root directory.
    
    Change-Id: Ieb5d807f529db9a4bf3e6c93e6b37c9648c04633
    Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>